Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction Required
No CVSS v3.0
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.00147.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Ntt-east
Subscribe
|
Pr-400ki
Subscribe
Pr-400ki Firmware
Subscribe
Pr-400mi
Subscribe
Pr-400mi Firmware
Subscribe
Pr-400ne
Subscribe
Pr-400ne Firmware
Subscribe
Pr-500ki
Subscribe
Pr-500ki Firmware
Subscribe
Pr-500mi
Subscribe
Pr-500mi Firmware
Subscribe
Pr-s300hi
Subscribe
Pr-s300hi Firmware
Subscribe
Pr-s300ne
Subscribe
Pr-s300ne Firmware
Subscribe
Pr-s300se
Subscribe
Pr-s300se Firmware
Subscribe
Rs-500ki
Subscribe
Rs-500ki Firmware
Subscribe
Rs-500mi
Subscribe
Rs-500mi Firmware
Subscribe
Rt-400ki
Subscribe
Rt-400ki Firmware
Subscribe
Rt-400mi
Subscribe
Rt-400mi Firmware
Subscribe
Rt-400ne
Subscribe
Rt-400ne Firmware
Subscribe
Rt-500ki
Subscribe
Rt-500ki Firmware
Subscribe
Rt-500mi
Subscribe
Rt-500mi Firmware
Subscribe
Rt-s300hi
Subscribe
Rt-s300hi Firmware
Subscribe
Rt-s300ne
Subscribe
Rt-s300ne Firmware
Subscribe
Rt-s300se
Subscribe
Rt-s300se Firmware
Subscribe
Rv-440ki
Subscribe
Rv-440ki Firmware
Subscribe
Rv-440mi
Subscribe
Rv-440mi Firmware
Subscribe
Rv-440ne
Subscribe
Rv-440ne Firmware
Subscribe
Rv-s340hi
Subscribe
Rv-s340hi Firmware
Subscribe
Rv-s340ne
Subscribe
Rv-s340ne Firmware
Subscribe
Rv-s340se
Subscribe
Rv-s340se Firmware
Subscribe
|
|
Ntt-west
Subscribe
|
Pr-400ki
Subscribe
Pr-400ki Firmware
Subscribe
Pr-400mi
Subscribe
Pr-400mi Firmware
Subscribe
Pr-400ne
Subscribe
Pr-400ne Firmware
Subscribe
Pr-500ki
Subscribe
Pr-500ki Firmware
Subscribe
Pr-500mi
Subscribe
Pr-500mi Firmware
Subscribe
Pr-s300hi
Subscribe
Pr-s300hi Firmware
Subscribe
Pr-s300ne
Subscribe
Pr-s300ne Firmware
Subscribe
Pr-s300se
Subscribe
Pr-s300se Firmware
Subscribe
Rt-400ki
Subscribe
Rt-400ki Firmware
Subscribe
Rt-400mi
Subscribe
Rt-400mi Firmware
Subscribe
Rt-400ne
Subscribe
Rt-400ne Firmware
Subscribe
Rt-500ki
Subscribe
Rt-500ki Firmware
Subscribe
Rt-500mi
Subscribe
Rt-500mi Firmware
Subscribe
Rt-s300hi
Subscribe
Rt-s300hi Firmware
Subscribe
Rt-s300ne
Subscribe
Rt-s300ne Firmware
Subscribe
Rt-s300se
Subscribe
Rt-s300se Firmware
Subscribe
Rv-440ki
Subscribe
Rv-440ki Firmware
Subscribe
Rv-440mi
Subscribe
Rv-440mi Firmware
Subscribe
Rv-440ne
Subscribe
Rv-440ne Firmware
Subscribe
Rv-s340hi
Subscribe
Rv-s340hi Firmware
Subscribe
Rv-s340ne
Subscribe
Rv-s340ne Firmware
Subscribe
Rv-s340se
Subscribe
Rv-s340se Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
Configuration 37 [-]
| AND |
|
Configuration 38 [-]
| AND |
|
Configuration 39 [-]
| AND |
|
Configuration 40 [-]
| AND |
|
Configuration 41 [-]
| AND |
|
Configuration 42 [-]
| AND |
|
Configuration 43 [-]
| AND |
|
Configuration 44 [-]
| AND |
|
Configuration 45 [-]
| AND |
|
Configuration 46 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-15554 | Cross-site request forgery (CSRF) vulnerability in Hikari Denwa router/Home GateWay (Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, RS-500KI firmware version Ver.01.00.0070 and earlier, PR-500MI/RT-500MI firmware version Ver.01.01.0014 and earlier, and RS-500MI firmware version Ver.03.01.0019 and earlier, and Hikari Denwa router/Home GateWay provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION PR-S300NE/RT-S300NE/RV-S340NE firmware version Ver. 19.41 and earlier, PR-S300HI/RT-S300HI/RV-S340HI firmware version Ver.19.01.0005 and earlier, PR-S300SE/RT-S300SE/RV-S340SE firmware version Ver.19.40 and earlier, PR-400NE/RT-400NE/RV-440NE firmware version Ver.7.42 and earlier, PR-400KI/RT-400KI/RV-440KI firmware version Ver.07.00.1010 and earlier, PR-400MI/RT-400MI/RV-440MI firmware version Ver. 07.00.1012 and earlier, PR-500KI/RT-500KI firmware version Ver.01.00.0090 and earlier, and PR-500MI/RT-500MI firmware version Ver.01.01.0011 and earlier) allow remote attackers to hijack the authentication of administrators via unspecified vectors. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-04T20:09:23.838Z
Reserved: 2019-01-10T00:00:00
Link: CVE-2019-5986
No data.
Status : Modified
Published: 2019-09-12T17:15:14.000
Modified: 2024-11-21T04:45:51.520
Link: CVE-2019-5986
No data.
OpenCVE Enrichment
No data.
EUVD